Cyware Monthly Threat Intelligence

Monthly Threat Briefing • June 1, 2020
Monthly Threat Briefing • June 1, 2020
The entire world is in the middle of a pandemic and people are mostly working from their homes. Organizations around the globe are devising security measures against cyber threats to protect their virtual workspaces. For instance, last month, Google launched the ‘Scam Spotter’ program to help individuals tackle COVID-19 related scams whereas, Microsoft open-sourced its Coronavirus threat intel data for security researchers. Moreover, the Cybersecurity and Infrastructure Security Agency (CISA) has updated defensive measures in the wake of heightened attacks on healthcare organizations.
Disarray caused by the pandemic has become a breeding ground for financially-motivated attacks, as implied by the Verizon 2020 Data Breach Investigations Report (DBIR). In one of the cases, hackers siphoned off data from different e-commerce sites and demanded $525 in Bitcoin for not disclosing it in public. Similarly, a group attacked Grubman Shire Meiselas & Sacks and held over 700 GB of its data to ransom. Meanwhile, Maze actors released the credit card details of the Bank of Costa Rica customers for not paying the ransom.
Greater threats surfaced last month due to rickety software and sophisticated malware capabilities. Security researchers discovered a new RangeAmp attack that could bring down websites and Content Delivery Networks (CDNs). Ako ransomware operators added a new tactic to extort more money from victims. Researchers also uncovered the new variants of many malware, including Astaroth, Zeus Sphinx, Dark Crystal RAT, and Anubis Trojan.
Two high-severity vulnerabilities found in the PageLayer plugin could let attackers wipe out the content and take control of WordPress sites. The plugin is installed on at least 120,000 sites.
A new form of DoS attack called RangeAmp can bring down websites and CDNs by amplifying web traffic. So far, there are two variants of the attack - RangeAmp Small Byte Range (SBR) and RangeAmp Overlapping Byte Ranges (OBR).
Ako ransomware operators evolved to add a new tactic in addition to the existing ‘naming and shaming’ strategy to force victim organizations into making extra ransom payments. The extra amount is for deleting the files from firms.
The capabilities of Grandoreiro trojan and Valak malware were enhanced to target Portuguese users and Microsoft Exchange servers, respectively. While the former was used to steal banking credentials, the later stole targeted enterprises’ credentials.
Netwalker ransomware evolved to include a reflective Dynamic-link Library (DLL) injection as one of its evasion techniques. The technique allows the injection of a DLL from memory rather than from the disk.
Academics from Germany and Italy found a new method to break the separation between Wi-Fi and Bluetooth technologies. The attack relies on a new class of vulnerability, named Spectra.
All computers manufactured before 2019 are affected by seven vulnerabilities found in Intel’s Thunderbolt hardware interface. Collectively known as Thunderspy, the flaws can allow attackers to gain physical access to devices and steal data from their hard drives.
Winnti hacker group targeted video game companies with a new PipeMon backdoor to achieve persistence. PipeMon’s first stage consists of a password-protected RARSFX executable embedded in the .rsrc section of its launcher.
Variants of malware such as Astaroth, Zeus Sphinx, Dark Crystal RAT, and Anubis Trojan were uncovered by researchers last month. While the new samples of Astaroth, Dark Crystal RAT, and Zeus Sphinx had anti-analysis techniques added to their modules, the new variant of Anubis, still under development, could allow attackers to gain granular insight into an infected device.
An attack campaign, dubbed Blue Mockingbird, was found exploiting a deserialization vulnerability (CVE-2019-18935) in the ASP.NET open-source web framework to deploy the XMRig Monero-mining payload on Windows systems. The campaign, which started in December 2019, lasted till April 2020.
A new variant of the SLocker Android malware infected user devices by disguising as ‘About Coronavirus’ app. In addition to this, threat actors updated the evasion capabilities of the EVILNUM Trojan that targeted the financial sector.